A Systemic view of One-Pass Cryptographic Key Distribution Techniques for WSNs
Manoj Ranjan Mishra1, Amit Vijay Kore2, Jayaprakash Kar3

1Manoj Ranjan Mishra*, School of Computer Applications, KIIT, Bhubaneswar, India.
2Amit Vijay kore, Research Scholar, School of Computer Engineering, KIIT, Bhubaneswar, India.
3Jayaprakash Kar, Department of Computer Science and Engineering, The LNMIIT, Jaipur, India.

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 3933-3942 | Volume-9 Issue-1, November 2019. | Retrieval Number: A5018119119/2019©BEIESP | DOI: 10.35940/ijitee.A5018.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The availability and use of cheaper and smaller sensors has brought an evolution in the field of Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to monitor and congregate data about the living organisms therein. In near future, millions more devices are expected to be connected. We focus upon the security services required by WSNs that are most challenging as compared to other networks. First, we introduce the commercially used motes with the comparison of technical and implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key distribution mechanism.
Keywords: Forward Secrecy, Implicit Key Authentication, key distribution, Known/Unknown key Security, Motes, One-pass key Establishment, Wireless Sensor Networks
Scope of the Article: Authentication, Authorization, Accounting